Which additional virtual machines can be updated by using Update1 and Update2?
HOTSPOT You have Azure virtual machines that have Update Management enabled. The virtual machines are configured as shown in the following table. You schedule two update deployments named Update1 and Update2. Update1 updates VM3. Update2 updates VM6. Which additional virtual machines can be updated by using Update1 and Update2? To...
Which three actions should you perform in sequence?
DRAG DROP You create an Azure subscription with Azure AD Premium P2. You need to ensure that you can use Azure Active Directory (Azure AD) Privileged Identity Management (PIM) to secure Azure roles. Which three actions should you perform in sequence? To answer, move the appropriate actions from the list...
Nantes’s of information should you provide to the developers?
You have an Azure SQL database. You implement Always Encrypted. You need to ensure that application developers can retrieve and decrypt data in the database. Nantes’s of information should you provide to the developers? Each correct answer presents part of the solution. NOTE: Each correct selection is worth one point.A...
Which level should you identify for each risk event?
DRAG DROP You are implementing conditional access policies. You must evaluate the existing Azure Active Directory (Azure AD) risk events and risk levels to configure and implement the policies. You need to identify the risk level of the following risk events: - Users with leaked credentials - Impossible travel to...
Which three actions should you perform in sequence?
DRAG DROP You have an Azure subscription named Sub1 that contains an Azure Storage account named Contosostorage1 and an Azure key vault named Contosokeyvault1. You plan to create an Azure Automation runbook that will rotate the keys of Contosostorage1 and store them in Contosokeyvault1. You need to implement prerequisites to...
Which key vault settings should you configure?
You have an Azure subscription that contains a virtual machine named VM1. You create an Azure key vault that has the following configurations: - Name: Vault5 - Region: West US - Resource group: RG1 You need to use Vault5 to enable Azure Disk Encryption on VM1. The solution must support...
What should you do?
From Azure Security, you create a custom alert rule. You need to configure which users will receive an email message when the alert is triggered. What should you do?A . From Azure Monitor, create an action group.B . From Security Center, modify the Security policy settings of the Azure subscription.C...
What should you do?
You need to ensure that users can access VM0. The solution must meet the platform protection requirements. What should you do?A . Move VM0 to Subnet1.B . On Firewall, configure a network traffic filtering rule.C . Assign RT1 to AzureFirewallSubnet.D . On Firewall, configure a DNAT rule.View AnswerAnswer: D Explanation:...
What should you use to assign access to each user?
HOTSPOT You have an Azure key vault. You need to delegate administrative access to the key vault to meet the following requirements: - Provide a user named User1 with the ability to set advanced access policies for the key vault. - Provide a user named User2 with the ability to...
What should you create?
You are configuring an Azure Kubernetes Service (AKS) cluster that will connect to an Azure Container Registry. You need to use the auto-generated service principal to authenticate to the Azure Container Registry. What should you create?A . an Azure Active Directory (Azure AD) groupB . an Azure Active Directory (Azure...